Packet-switched computer networks of all sizes are widely used for personal, professional, and governmental communication. However, the speed, versatility, and largely unregulated nature of computer networks coupled with the availability of affordable high-capacity storage makes it possible and even practical to routinely maintain detailed logs of communication without indication to the communication partners. Although the contents of messages can be protected by cryptography, the simple fact that the network carries an encrypted message from one party to another is a piece of intelligence not as easily protected. For example, the message's destination must be revealed at some level so the network can deliver it. In this two-part disse...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
Abstract:- The current methods of communication using steganography techniques involve the use of ca...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
User anonymity faces increasing threats from private companies, network service providers, and gover...
With the development of online communications in the past decades, new privacy concerns have emerged...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
People sometimes need to communicate directly with one another while concealing the communication it...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
AbstractIn cryptography we investigate security aspects of data distributed in a network. This kind ...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
In this thesis, we tackle the problem of securing communication in Local Area Networks (LANs) and ma...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
Abstract:- The current methods of communication using steganography techniques involve the use of ca...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...
User anonymity faces increasing threats from private companies, network service providers, and gover...
With the development of online communications in the past decades, new privacy concerns have emerged...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
People sometimes need to communicate directly with one another while concealing the communication it...
This dissertation proposes multiple network defense mechanisms. In a typical virtualized network, th...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Before sharing or publishing network traffic data, anonymisation is regarded as a necessary step to ...
AbstractIn cryptography we investigate security aspects of data distributed in a network. This kind ...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
In this thesis, we tackle the problem of securing communication in Local Area Networks (LANs) and ma...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
M.Sc.Using the Internet for communication purposes constitutes a high risk, considering the security...
Abstract:- The current methods of communication using steganography techniques involve the use of ca...
Using traffic analysis, it is possible to infer who is talking to whom over a public network. This p...